1.1 Background Of The Study
The ongoing developments in information technology have resulted in huge growth in both the number of Internet users and the number of digital products (Probets, 2012). By taking advantage of the quick technology advancement and financial mar...
Background of the study
“Rural” means open land and tiny settlements in general, although "rural areas" are typically taken for granted or left undefined in policy-oriented and scientific literature, in a process of description that is sometimes la...
BACKGROUND OF THE STUDY
The function of performance appraisal is a strategic aspect in any review of the conditions required for an organization's growth and survival. It is considered that both the person and the organization require knowledge of h...
BACKGROUND OF THE STUDY
Human beings are wired to continuously search for ways to make things simpler and more pleasant in their lives (Martha, 2014). This underlying universal component that drives inventions, innovations, and tactics may also be used...
BACKGROUND OF STUDY
The notion of auditing data dates back to ancient times, with the oldest signs of its existence discovered among major landowners of the Middle Ages in Italy and Egypt.
However, according to afounka (1993), statutory auditi...
Background Of The Study
The 21st century has witnessed a great exodus from the traditional business model (Brick) to Electronic business (Click).This paradigm shift can be associated with the corresponding increase in the knowledge of information t...
Background of the study
The use of computers for the gathering, retrieval, transfer, and operation of data or information is known as information technology. It's also seen as a subset of ICT. Information technology is the use of computers to store,...
Background to the Study
The advancement in science and technology and their application in education have yielded rich dividends in almost all disciplines related to the management and organization of the education system. This applied aspect of technol...
ABSTRACT
This study was carried out to examine how to prevent computer system infection and compromise using trojan tool and process. Trojan tool users in Ikeja, Lagos State form the population of the study. Specifically, the study was aimed at examinin...
Introduction
In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...
BACKGROUND OF THE STUDY
Globally, the nature of human beings is that of constantly looking for ways of making things easier and making life comfortable. This underlying universal factor, which drives inventions, innovations and strategies, is also appli...
BACKGROUND OF THE STUDY
In any serious country, state, organization, or individual, education is a vital sector that cannot be taken lightly, and as a result, an individual, organization, or government will go to great lengths to ensure that her citizen...
BACKGROUND OF THE STUDY
Accounting is the art of recording, classify...
INTRODUCTION
Face recognition system is an application for identifying someone from image or videos. Face recognition is classified into three stages ie)Face detection,Feature Extraction ,Face Recognition. Face detection method is a difficult task in image analysis. Fac...
Abstract
The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...
Background of the Study
The Nnamdi Azikiwe University Alumni Association has been in existence for a number of years but has not been able to become a viable entity. The association's goal is to provide a professional network for the graduates of the Nnamdi Azikiwe...
OBJECTIVE OF THE STUDY
Networking is the backbone of accessing vital information the world has becomes a global village, sharing everything through networking. Networks requires a high level of security, which involves the technical and administrative...
OBJECTIVE OF STUDY
In view of the problems mentioned above, this project is aimed at implementing a sales forecasting system using linear regression model and with an added POS system
PURPOSE OF THE STUDY
The purpose of the study is to design a system which shall render an assistance to the computer scientist during the installation and maintenance of a compute network. Moreover, proper installation of various...
STATEMENT OF PROBLEM
The existing system used by FIRS has been a challenge to them. Amongst the problems affecting the FIRS from maintaining a steady reliable accounting figures and estimates are:-
INTRODUCTION
The most recent trend in small company operations necessitates simple access to the location of enterprises and their clients/businesses in order to conduct productive transactions. Also required in the city are locations and other informat...
Introduction
As the world's population grew, so did the number of lineups and their length. More clients equals more commercial transactions in the business sector. An effective queuing system is one of the numerous strategies to attract consumers since it decreases...
INTRODUCTION
Constructing and putting together one's own computer system provides the user with the highest possible level of satisfaction and a very satisfying experience. To Assembles Desktop PC (Personal Computer) The users and builders of such systems are presum...
Background of the Study
The application of information and communication technology concepts, techniques, policies and implementation strategies to banking services has become a subject of fundamental importance and concerns to all banks and indeed a pr...
Background of study
Globally, the majority of educational institutions take attendance manually. It is not only time consuming, but also unsecure, unreliable, and susceptible to loss. Some institutions use punch cards for attendance, which makes it difficult for teacher...
Introduction
An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...
Background of Study
Recent years have seen a remarkable growth in technological advancements. This period saw the introduction of the electronic computer system and other modern technologies. Currently, computer technology has invaded almost every eleme...
BACKGROUND OF THE STUDY
Education is one of the basic rights of every individual. Education prepares a person for life's problems. As a result, Gujjar, Khan, Baig, Ramzan, and Saifi (2010) concluded that education is essential not just for imparting...
BACKGROUND OF THE STUDY
Cyber-attacks are constantly making headlines, putting countries, industries, and businesses at danger of security breaches. With society's reliance on technology and the introduction of the internet, things could get even wo...
BACKGROUND OF THE STUDY
The capacity to convey one's thoughts through a set of signs (text), gestures, and noises is referred to as language. It is a distinguishing property of humans, who are the only organisms with such a system. Speech is the oldest and most exte...
ABSTRACT
This research is on the challenges of cost benefit analysis in a computerized auditing System. The purpose of this study is to enquire into the viability or other wise of computerized auditing Systems, with particularly referen...
ABSTRACT
The main aim of this study dwells on the effect of computerization of library on students’ academic performance using tertiary institution in Lagos State as case study. Survey research design was adopted for the study and with the a...
ABSTRACT
This research tends to examine information technology and systems audit with reference to First Bank Nigeria Plc. The research employ survey design and a simple random sampling technique was adopted for selection of respondents, ...
ABSTRACT
This study was carried out to examine the modern office equipments and their contributions to the success of a business organization a case study of NNPC depot in Enugu state. Specifically, the study examined wha...
ABSTRACT
This research work has the title “problems and possible solutions of teaching-learning of computer science effectively in the junior secondary schools”. A case study of Enugu urban in Enugu state. This study was embarked on in...
BACKGROUND OF THE STUDY
It is said that to mange on organization is to manage its future. How can the future be management? The answer through a timely procurement of relevant and reliable information is the complement of its procurement. The whole lot of activities the...
Abstract
The study looked into the assessment of fingerprint authentication system for ATM security. Specifically, the study aim to provide a platform that will allow the bankers to collect customers’ finger print, provide a platform t...
Abstract
This research work has the title “problems and possible solutions of teaching-learning of computer science effectively in the junior secondary schools”. A case study of Enugu urban in Enugu state. This study was embarked on in order to discove...
Background to the study
The university plays a central role in the development of a nation; it provides the intellectual force and manpower needed to sustain the socio-economic and political aspiration of the nation. According to Wikipedia, the free online encyclo...
BACKGROUND OF THE STUDY
The world is becoming a smaller place in which to live and work. A technological revolution in communications and information exchange has taken place within business, industry and homes. Most developed and developing countries are substantially more invested in...
ABSTRACT
This project aims at automating the examination supervision scheduling of the institute of management and technology, Enugu.
An in-dept study made on the existing system of the case study and it’s automation can...
Background of the Study
The Nnamdi Azikiwe University Alumni Association has been in existence for a number of years but has not been able to become a viable entity. The association's goal is to provide a professional network for the graduates of the Nnamdi Azikiwe...
ABSTRACT
This study was carried out to examine how to prevent computer system infection and compromise using trojan tool and process. Trojan tool users in Ikeja, Lagos State form the population of the study. Specifically, the study was aimed at examining the methods...
Background of the study
In 1949 the government of Nigeria appointed F.J. Harlow, principal of Chelsea Polytechnic (London) to assess the need of establishing a College or Colleges of Higher Technical Education (Fafunwa 1994). The report of the two teams led to the estab...
ABSTRACT
This project is aimed at designing an Online Tourism Management System (Case Study of Niger State Tourism Corporation). Tourism is very important to the growth of every Nation’s economy. There is an existing manual tourism management syst...
ABSTRACT
This research work “Computerized Audit System: Issues, Problems and Prospects” (A Case Study of Akintola Williams Deloitte Abuja). Tries to examine the advantages of computerized auditing. To assess the computerized audit p...
Statement of the Problem
The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:
Introduction
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by...
The study was conducted to investigate the extent of availability of computer systems and accessories for effective teaching and learning in senior secondary schools in Enugu North Local Government Area. The population of the study consisted of two hundred and forty...
1 BACKGROUND TO THE STUDY
According to wikipedia (2015), artificial intelligence (AI) is the intelligence exhibited by machines or software. It is also the name of the academic field of study in computer science which studies how to create computers and compute...